The Macnamara Blog
Everyone gets phishing emails. Unfortunately they’re everywhere. Most get filtered through to your junk folder or caught before they are even delivered, but some still get through. But what they are and how they work isn’t always clear. Here we’ll try to de-mystify an all too common and potentially dangerous nuisance.
Protecting your sensitive data with a password seems like a good thing to do, right? So why would we say it is not a clever idea? Because protecting the location is better than protecting the document.
By the end of 2019, cyber-attacks and technology-enabled scams against small businesses were soaring off the scale.
The answer is sadly straightforward: the attacks are working. That is, they’re delivering lucrative returns on investments.
In our post on how to spot a fake email, we covered some easy ways to identify the spams, scams and spoofs that inevitably land in your inbox.
But it’s not easy to write one post covering everything. And it’s not uncommon for us to receive a few reports a day from our clients of scamming: there’s a lot of it out there, much of it increasingly hard to identify.
That’s why we’re going to break it down further today and take you through the anatomy of a scam email.
As we move increasingly towards online services, securing your account is more important than ever.
While computer viruses still exist, they’re no longer the route of choice for hackers to get control of your data. Instead, the prevalence of online services means that the bad guys are targeting your cloud services, such as your email and file storage.
What on earth is this one about, I hear you ask? The Internet Of Things, that’s what; those millions of things that connect to the internet, like your home central heating, your toaster, webcams, children’s toys and yes, even fish tanks, allowing them to send you messages and alerts, or to be controlled and managed from your smartphone.